Capture the flag results

The RUXCON Capture the flag consisted of two sets of challenges, designed to test your offensive and defensive skills, with a bit of logic thrown in for fun. It also tested particants ability to make themselves comfortable on a box that they don't have root on.



The CTF competition was ran with two differing tasks. The first had a bunch of default installed operating systems, and your challenge was to compromise as many as possible, obtain the flag, and if you want, keep control over the box.



The second challenge involved analysing the security of systems, and incrementally compromising the system, collecting flags as you go.



So... what I can download from all this?

You are able to download the VMware filesystem images, as well as the TTY recordings of who created an account on the system and whom logged in. ttyplay will allow you to view in real time what people were doing.



The VMware images can be downloaded here, and can also be downloaded here here. It would be preferred if you and your friend want to use the images, that only one of the images, to save bandwidth on our side... The VMware files are approximately 4G in size.



The ttyrec files can be downloaded here

About the VMware images

The gateway vmware's root password is changme, and you'll need to configure the eth0 interface to be on the network you're on.

You'll also need to bring up the eth1 and eth2 interface, via ifconfig eth1 1.1.1.1 netmask 255.255.255.0 and ifconfig eth2 1.1.2.1 netmask 255.255.255.0

Scores